Cybersecurity

“After exposing three critical zero-day vulnerabilities in Microsoft’s Windows operating systems, Google’s Project Zero vulnerability research program has revealed the existence of three more zero-day vulnerabilities, but this time, on Apple’s OS X platform.” (Source: G...

“In a couple days, the Defense Information Systems Agency will set up its third cyber structure in the last four years. That’s not a criticism, but rather it’s a strong indicator of how fluid the challenges facing cyber defenses are. First there was the Joint Task Force, Global Network Ope...

“At the most recent FedCyber event, hosts Bob Gourley and Matt Devost compiled a list of 10 disruptive technologies and asked the audience to complete a survey regarding which of the technologies would be most disruptive in the coming years.” (Source: FedCyber Disruptive Tech Rankings ...

“President Obama on Tuesday will unveil new proposals to protect businesses and the government from cyberattacks, including increasing the prosecution of crimes conducted through computer networks and toughening penalties for them. Under the steps to be outlined by Mr. Obama, companies that sh...

“In the birch woods that ring the eastern Estonian city of Tartu, 50km from the Russian border, Nato is preparing for cyber war. From this Baltic outpost, the alliance this week conducted the world’s biggest digital war game. Security was so tight that Nato did not reveal the existence o...

“Domestic Internet traffic traveling inside the borders of Russia has repeatedly been rerouted outside of the country under an unexplained series of events that degrades performance and could compromise the security of Russian communications.” Source:WTF, Russia’s domestic Internet tra...

“The world is likely to suffer a major cyber attack causing ‘widespread harm to a nation’s security and capacity to defend itself’ before 2025, according to a survey of more than 1,600 experts carried out by the Pew Research Center.” Source:The world is due ‘a major cyber att...

“The FBI is attempting to persuade an obscure regulatory body in Washington to change its rules of engagement in order to seize significant new powers to hack into and carry out surveillance of computers throughout the US and around the world. Civil liberties groups warn that the proposed rule...

“In 2007, the FBI was tracking down a series of bomb threats against Timberline High School, originating from an anonymous MySpace page. To break through that anonymity, agents had to get creative — but new documents suggest that in catching the culprit, the FBI may have committed a crime of...

“The DCC formally resides within the Royal Netherlands Army, the land forces element of the Dutch armed forces (in Dutch: ‘Commando Landstrijdkrachten’ (CLAS)), but involves officers from all military domains. The DCC is primarily tasked with defense, but will also work on offense and, to...